Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 508370 (CVE-2014-2980) - <gnustep-base/gnustep-base-1.24.6-r1: incorrect log handling leading to gdomap denial of service (CVE-2014-2980)
Summary: <gnustep-base/gnustep-base-1.24.6-r1: incorrect log handling leading to gdoma...
Status: RESOLVED FIXED
Alias: CVE-2014-2980
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B3 [glsa]
Keywords:
Depends on:
Blocks: 508626
  Show dependency tree
 
Reported: 2014-04-22 07:33 UTC by Agostino Sarubbo
Modified: 2014-12-13 18:32 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-04-22 07:33:41 UTC
From ${URL} :

A flaw was found in the way GNUstep's gdomap (GNUstep Distributed Objects nameserver) handled logging. A 
remote attacker could send a crafted request to gdomap that would cause gdomap to abort. This issue 
affects version 1.24.6 and earlier versions.

Upstream bug: https://savannah.gnu.org/bugs/?41751
Upstream patch: 
http://svn.gna.org/viewcvs/gnustep/libs/base/trunk/Tools/gdomap.c?r1=37756&r2=37755&pathrev=37756

References:

http://seclists.org/oss-sec/2014/q2/143


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Bernard Cafarelli gentoo-dev 2014-04-23 09:54:38 UTC
gnustep-base/gnustep-base-1.24.6-r1 is now in ~arch, with the backported fix.

As gnustep-base/* packages usually need to go stable in formation, I'll check and make a stabilization list to go along with gnustep-base-1.24.6-r1 (1.24.6 was ready for stabling anyway)
Comment 2 Bernard Cafarelli gentoo-dev 2014-04-24 08:26:38 UTC
gnustep packages work fine enough here with current stable packages and =gnustep-base/gnustep-base-1.24.6-r1, no need to stable other gnustep-* packages for this security bug

=gnustep-base/gnustep-base-1.24.6-r1 is good for security stabling, target arches: amd64, ppc, sparc, x86
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2014-05-02 03:19:31 UTC
Arches, please test and mark stable:

=gnustep-base/gnustep-base-1.24.6-r1

Target Keywords : "amd64 ppc spark x86"

Thank you!
Comment 4 Agostino Sarubbo gentoo-dev 2014-05-04 08:20:44 UTC
amd64 stable
Comment 5 Agostino Sarubbo gentoo-dev 2014-05-10 14:02:24 UTC
ppc stable
Comment 6 Agostino Sarubbo gentoo-dev 2014-05-14 16:11:54 UTC
sparc stable
Comment 7 Agostino Sarubbo gentoo-dev 2014-05-18 10:16:33 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 8 Bernard Cafarelli gentoo-dev 2014-05-20 08:56:40 UTC
Vulnerable versions removed from tree
Comment 9 Yury German Gentoo Infrastructure gentoo-dev 2014-05-21 02:27:23 UTC
Maintainer(s), Thank you for cleanup!

Security please Vote!
Comment 10 Yury German Gentoo Infrastructure gentoo-dev 2014-06-12 04:33:45 UTC
GLSA VOTE: Yes
Comment 11 GLSAMaker/CVETool Bot gentoo-dev 2014-06-16 05:11:30 UTC
CVE-2014-2980 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2980):
  Tools/gdomap.c in gdomap in GNUstep Base 1.24.6 and earlier, when run in
  daemon mode, does not properly handle the file descriptor for the logger,
  which allows remote attackers to cause a denial of service (abort) via an
  invalid request.
Comment 12 Tobias Heinlein (RETIRED) gentoo-dev 2014-08-04 19:07:26 UTC
YES too, request filed.
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2014-12-13 18:32:15 UTC
This issue was resolved and addressed in
 GLSA 201412-20 at http://security.gentoo.org/glsa/glsa-201412-20.xml
by GLSA coordinator Sean Amoss (ackle).